Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 36)
A Holistic Approach to Securing Memory Error Vulnerabilities in IoT Firmware
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
An Approach Towards an Autonomic Computing Prototype Reference Architecture
Autonomous Malware Deception and Orchestration
Building an Efficient and Scalable Learning System on Heterogeneous Cluster
Deep Structured Learning in Medical Image Analysis
Developing Privacy Enhancing Technology For DNA Data Sharing In Public Genealogy Platforms
Discovering Zero-day Attacks By Leveraging Cyber Threat Intelligence
ENFORCING SECURITY POLICIES WITH DATA PROVENANCE TO ENRICH THE SECURITY OF IOT/ SMART BUILDING SYSTEM
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Evaluating Co-Creation In Collaborative Drawing Using Creative Thinking Modes
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
Fast and Energy-Efficient Mobility Management in Mobile Edge Computing Networks
HYBRID COMPARATIVE PREDICTIVE MODELING
MULTIMODAL VISUALIZATION USING AUGMENTED REALITY AND LARGE DISPLAYS
Mitigation of Crossfire Attacks in Software Defined Networks Using Random Forest Machine Learning Algorithm
Modeling Twitter Data for Effective Dissemination of Health-related Information
More Efficient Learning in Traffic Grids Viewed as Complex Adaptive Systems Using Agent Based Modeling